Journal of the ACM (JACM)
Protecting digital media content
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
How to Explain Zero-Knowledge Protocols to Your Children
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
International Journal of High Performance Computing and Networking
The use of digital watermarking for intelligence multimedia document distribution
Journal of Theoretical and Applied Electronic Commerce Research
An enhanced secure buyer-seller watermarking protocol
Proceedings of the International Conference on Advances in Computing, Communication and Control
Improving the robustness of DCT-based image watermarking against JPEG compression
Computer Standards & Interfaces
A generalized method for constructing and proving zero-knowledge watermark proof systems
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Hi-index | 0.00 |
In current digital watermarking schemes used to deter piracy of multimedia content, the owner typically reveals the watermark in the process of establishing piracy. Once revealed, a watermark can be removed. We eliminate this limitation by using cryptographic protocols to demonstrate the presence of a watermark without revealing it.